SEARCH KEYWORD -- binary data
Mozilla Firefox Browser Tips & Tricks You Didn't Know About
Chrome might be all the rage right now, but Mozilla’s Firefox browser has always held its own in the browser wars. This open-source browser has its core set of dedicated fans and is popular under a broad user base across the world. With Firefox’s faster web page download speeds and strong privacy policies, it’s not hard to imagine why. But there are some other brilliant features that many might have missed. Take a look at these seven Firefox tricks that many users don’t k...
Only fast languages are interesting
If this isn’t a Zawinski quote, it should be. I have avoided the JVM my entire life. I am presently confronted with problems which fit in the JVM; JVM libraries, concurrency, giant data: all that good stuff. Rather than doing something insane like learning Java, I figured I’d learn me some Clojure. Why not? It’s got everything I need: JVM guts, lispy goodness; what is not to love? Well, as it turns out, one enormous, gaping lacuna is Clojure’s numerics performanc...
Fast language,Clojure,Perl,JVM SLOW,Lush 2011-11-30 11:16:01
A brief guide to tech internships
Planning to be an Intern in the Bay Area during Summer 2012? Make sure to read an Intern's Guide to the Bay Area, and join the 2012 Facebook group. (via this guy, via this guy) Joel Spolsky, from the Joel On Software blog and StackOverflow, wrote an article with Advice for Computer Science College Students back in '05. According to Joel, No matter what you do, get a good summer internship. As such: here’s everything you ever wanted to know about tech inter...
Internship,Advice,CS student 2012-02-01 04:48:31
All I Know About Certificates -- Clients
Finally, in last article we’ve covered the responsibilities of CAs, showing that being a CA isn’t simple and has high management costs, explaining why issuing certificates costs money! This article we will cover the client in this chain. Verifying Certificates as a Client For clients, verifying certificates isn’t simple either. Articles introducing TLS handshakes often mention "the server sends back a certificate, and the client verifies it," but in reality, as ...
CLIENTS,WEBSITES,SSL CERTIFICATE,CERTIFICATE AUTHORITY,CA 2024-07-26 22:24:30
IoT System Cyber Attack Case Study 02: Python Deserialization Attack and Library Hijacking Attack
Project Design Purpose: The objective of this cyber attack case study is to develop a workshop that demonstrates how a red team attacker can permanently compromise a people detection radar IoT device. The attack path is achieved through a series of attacks, including traffic eavesdropping, data deserialization attacks, web shell attacks, remote command/code execution, and Python library hijacking attacks. This case study is intended for IoT and data security professional training, aiming to ill...
10 reasons why I "hate" working in Facebook
To me, the past two years in Facebook is simply a nightmare, To celebrate the upcoming 2 year anniversary, I decided to jump out of it. Facebook, I have so many reasons to hate you. However, for fear that readers find me too annoying, I take my complaints to be condensed into the top ten reasons.1. Why should submit so much code? In the past two years, the number of Facebook engineers is doubled, and the amount of code submitted by each engineer is also increased with the increase of the number ...
HTTP Server development resource summary
This article summarizes some materials, articles and books I used when learning HTTP Server development. Hope this will help you. RFC and standard documents RFC2616 – Hypertext Transfer Protocol — HTTP/1.1 HTTP protocol standard document, it's an essential reference document for all personnel engaged in the development of the HTTP-related projects, careful study is recommended. RFC793 – TRANSMISSION CONTROL PROTOCOL TCP Protocol standard document The WWW Common Gateway Interfac...
HTTP Server,Book,Article 2012-09-25 22:46:56
the Performance Golden Rule
Yesterday I did a workshop at Google Ventures for some of their portfolio companies. I didn’t know how much performance background the audience would have, so I did an overview of everything performance-related starting with my first presentations back in 2007. It was very nostalgic. It has been years since I talked about the best practices from High Performance Web Sites. I reviewed some of those early tips, like Make Fewer HTTP Requests, Add an Expires Header, and Gzip Components. ...
Web design,Golden rule,Performance 2012-02-17 07:51:09
Telecom elements in WeChat
As an engineer who spends much time on focusing on WeChat like applications(Skype, Fring, Viber, Kik Messenger, WhatsApp, Talkbox, LINE, Kakao Talk) , I would like to share with you the telecom element in WeChat to show the inheritance and integration of traditional telecom services in the Internet service and applications.First, WeChat is an application to send messages, the fully IP-based messaging capabilities may replace the traditional telecom services such as SMS, MMS and VMS ,This is ver...
WeChat,Telecom operator 2013-04-13 20:29:46
How Query Optimizer Works in RDBMS
In a previous post, we discussed how the various relational operators are implemented in relational database systems. If you have read that post, you probably still remember that there are a few alternative implementations for every operator. Thus, how should RDBMS determine which algorithm (or implementation) to use? Obviously, to optimize the performance for any query, RDBMS has to select the correct the algorithm based on the query. It would not be desirable to always use the same algori...
DATABASE,DATABASE DESIGN,DATABASE OPTIMIZATION 2019-04-20 07:26:32
RECENT
- Private LLM Integration with RAGFlow: A Step-by-Step Guide
- First Touch on OpenAI API
- Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
- SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- more>>